{"title":"State and Disturbance Observer Based Control for a Class of Linear Uncertain Systems","authors":"N. Ali, Waqar Alam, A. Rehman, M. Pervaiz","doi":"10.1109/FIT.2017.00032","DOIUrl":"https://doi.org/10.1109/FIT.2017.00032","url":null,"abstract":"The disturbance observer based stabilization of a generalized linear uncertain system is studied. All the states variables are assumed to be immeasurable and are not available in feedback to the designed controller and disturbance estimator. Firstly, for the purpose of state estimation Luenberger observer is investigated. In addition, to eradicate the influence of norm bounded disturbance a linear disturbance observer is designed in the second step. Finally, an algorithm based on state feedback controller is designed to regulate the states trajectories to the origin. To validate the effectiveness of proposed scheme a numerical example is provided.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127142703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adding Temporal Dimension in Social Network by Using Link Analysis","authors":"F. Riaz, Rashid Abbasi, Z. Mahmood","doi":"10.1109/FIT.2017.00047","DOIUrl":"https://doi.org/10.1109/FIT.2017.00047","url":null,"abstract":"Social Media Systems (SMS) are included in the category of web-based systems. All the social media sites are merged by Social Media Systems. On account of having dynamic nature, these media sites like amazon flicker so on and so forth, are fronting interaction overhead predicament. In order to subjugate the predicament, the researchers have proposed the framework termed as Social Recommender System (SRS). The most pertinent information is filtered by these systems to target web user with the use of information filtering process and Folksonomy base structure. Folksonomy does not work alone, but with the amalgamation of the graph-based approach and content-based approach which support the older tags. The graph-based approach used for link analysis whereas content-based approach is used with the degree of relevance between the query and the document. The temporal dimension of users and tags are not deliberated by these approaches or techniques. As the user's interests modify with the passage of time, this work gives argument regarding the temporal dimension of the users and tags which encompass the high level of importance. ‘TimeFolkRank’ (TFR), a technique is also presented in this paper which uses link analysis. In addition, the temporal dimension of the users and tags are not deliberated by this technique. In this paper, the proposed model has been evaluated with FolkRank and Language models having the status of baseline models. On Bibsonomy Dataset, our work measure the recall, precision and F1 measure of the recommended tags and users. The proposed model’s results highlight the degree of importance over existing results through experimental results.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121930808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secrecy Analysis of Relay Assisted Device-to-Device Systems under Channel Uncertainty","authors":"Furqan Jameel, F. Khan, M. Haider, Asim Ul Haq","doi":"10.1109/FIT.2017.00068","DOIUrl":"https://doi.org/10.1109/FIT.2017.00068","url":null,"abstract":"This work investigates the impact of channel estimation errors from the perspective of physical layer security in relay assisted Device-to-Device (D2D) communication. Specifically, we derive a generalized closed-form expression of outage probability of the secrecy capacity of N hop relay based D2D communication system. A single eavesdropper is assumed to be present at each hop to intercept the confidential message. Best relay is selected among the cluster of M relays to form a secure link from source to destination. We then quantify the changes in secrecy performance of D2D systems for both certain and uncertain channel information. Analytical and simulation results are provided to validate the derived results.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130611980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gaussian Cellular Automata Model for the Classification of Points Inside 2D Grid Patterns","authors":"Mammona Qudsia, M. Saeed","doi":"10.1109/FIT.2017.00069","DOIUrl":"https://doi.org/10.1109/FIT.2017.00069","url":null,"abstract":"A cellular automaton (CA) is a discrete computational system which consists of interconnection of cells that update their state at every time stamp according to some local rule. Rules are defined over neighborhoods and the most commonly used neighborhoods being Moore and von-Neumann neighborhood. In the past, cellular automata have been used in data classification tasks but the neighborhood definitions used are Moore and von-Neumann neighborhood, which are purely local. This paper proposes an efficient data classification algorithm known as Gaussian cellular automata (GCA) that uses cellular automata with semi local neighborhoods i.e., Gaussian kernel which includes Moore neighbors in the specified radius. Here, all neighbors do not have equal contribution in determining the label, their contribution decreases with increase in distance and vice versa. Experiments show that the proposed algorithm performs better than the existing cellular automaton models, i.e., Fawcetts Model [2] and Omers models [3] in terms of accuracy, execution time and number of generations required for convergence.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121284468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compliance Checking of Shipment Request by Utilizing Process Mining Concepts: An Evaluation of Smart Auditing Framework","authors":"F. Bukhsh, H. Weigand","doi":"10.1109/FIT.2017.00049","DOIUrl":"https://doi.org/10.1109/FIT.2017.00049","url":null,"abstract":"Risk regulations and compliance management require business controls automation. Business processes execution yield event logs and analysis of these logs can produce valuable knowledge for organizational product and/or service improvements. In this paper we have explored a monitoring scenario of shipment request and evaluated it on the basis of Smart auditing framework. A combination of process mining techniques and business process ontologies is evaluated on simulated data in order to identify the auditing/monitoring capability of PROM plug-in’s. The initial evaluation revealed that rule based audit is successful on machine-crafted data in PROM tool. Moreover, this paper also highlights lack of automated rule translation in LTL-checker (PROM plug-in) for smart audit frameworks evaluations.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114335688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Moisture Sensing Using Dual-Polarized Printable Chipless RFID Tag","authors":"N. Javed, Ayesha Habib, Y. Amin, H. Tenhunen","doi":"10.1109/FIT.2017.00041","DOIUrl":"https://doi.org/10.1109/FIT.2017.00041","url":null,"abstract":"In this paper, a dual-polarized 18-bit tag based on Kapton®HN, is proposed. The chipless humidity sensor has a size of 13.2 × 24.6 mm2. The tag is composed of eight horizontally and ten vertically polarized slots. H-polarized slots will fully respond to H-polarized plane wave and vice versa. The tag is capable of generating 218=2,62,144 unique IDs that are helpful when tagging thousands of items. The proposed Kapton®HN based humidity sensor has a potential to replace expensive discrete humidity sensors.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125201401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kanza Hamid, Amina Asif, Wajid Arshad Abbasi, D. Sabih, F. Minhas
{"title":"Machine Learning with Abstention for Automated Liver Disease Diagnosis","authors":"Kanza Hamid, Amina Asif, Wajid Arshad Abbasi, D. Sabih, F. Minhas","doi":"10.1109/FIT.2017.00070","DOIUrl":"https://doi.org/10.1109/FIT.2017.00070","url":null,"abstract":"This paper presents a novel approach for detection of liver abnormalities in an automated manner using ultrasound images. For this purpose, we have implemented a machine learning model that can, not only generate labels (normal and abnormal) for a given ultrasound image but, it can also detect when its prediction is likely to be incorrect. The proposed model abstains from generating the label of a test example if it is not confident about its prediction. Such behavior is commonly practiced by medical doctors who, when given insufficient information or a difficult case, can choose to carry out further clinical or diagnostic tests before generating a diagnosis. However, existing machine learning models are designed in a way to always generate a label for a given example even when the confidence of their prediction is low. We have proposed a novel stochastic gradient descent based solver for the learning with abstention paradigm and use it to make a practical, state of the art method for liver disease classification. The proposed method has been benchmarked on a data set of approximately 100 patients from MINAR, Multan, Pakistan and our results show that the performance of the proposed scheme is at par with medical experts.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"85 26","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131878556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jehad M. Hamamreh, Haji. M. Furqan, Zain Ali, G. Sidhu
{"title":"An Efficient Security Method Based on Exploiting Channel State Information (CSI)","authors":"Jehad M. Hamamreh, Haji. M. Furqan, Zain Ali, G. Sidhu","doi":"10.1109/FIT.2017.00058","DOIUrl":"https://doi.org/10.1109/FIT.2017.00058","url":null,"abstract":"A channel amplitude quantization method that can effectively quantize the channel response using just one single threshold value is proposed in order to extract a random manipulating sequence with good secrecy properties. Specifically, a Time Division Duplex (TDD) wireless system is considered over independent identical distributed (i.i.d.) Rayleigh fast fading channel, where potential passive eavesdroppers (Eves) can only estimate their own channel and have no knowledge about CSI between legitimate communication parties. The transmitter (Alice) is only aware of the CSI of the legitimate user (Bob). Particularly, the proposed security technique takes the bits of the transmitted data packets and manipulate them with a logical vector that characterizes the channel randomness based on the estimated CSI gain. The process of manipulation is implemented on a bit level basis using an XOR operation exactly before modulation process. The same XOR operation is implemented after demodulation process on the detected bits to extract the concealed bits. The obtained simulation results show that the employment of such mechanism can ensure data confidentiality. Furthermore, the simulation results are extended to include the effect of the selected quantization threshold on the BER performance of Eve as well as the amount of information leakage to its side. It is shown that security gap region between Bob and Eve is made very large over all expected Signal to Noise ratio (SNR) values despite the small degradation in the bit error rate (BER) performance of Bob because of the expected channel estimation errors due to noise.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116747985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qazi Ali, Malika Bakhtawar, Omama Sohail, D. Hussain, S. Siddiqi, I. Shah, S. Waqas
{"title":"Reconfigurable Cluster Head Selection Protocol for Heterogeneous Wireless Sensors","authors":"Qazi Ali, Malika Bakhtawar, Omama Sohail, D. Hussain, S. Siddiqi, I. Shah, S. Waqas","doi":"10.1109/FIT.2017.00062","DOIUrl":"https://doi.org/10.1109/FIT.2017.00062","url":null,"abstract":"This work presents a study on the energy consumption of Wireless Sensor Networks (WSNs) while collecting the environmental information from the associated nodes. The lifespan of these nodes is very short because of the limited availability of energy which has given rise to the significant challenge in designing an energy efficient routing protocol. In this paper, a new Reconfigurable Cluster Head Selection (RCH) protocol has been presented which has an innovative concept – reconfiguration of fixed Cluster Heads (CHs). The status ‘reconfigurable’ means that the network reconfigures itself by selecting new CH from among the normal nodes. This process is done when the available CH is about to die due to energy constraints.The proposed protocol maintains stability and prolonged duration of communication by selection of new CH within the cluster for securing the communication to meet an outage. Monte Carlo simulations are carried out in MATLAB and results show that because of the new proposed RCH protocol, the system is more energy efficient as compared with already available LEACH protocol.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133941235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Topic Modeling for Single Document Short Texts","authors":"Anamta Sajid, S. Jan, I. Shah","doi":"10.1109/FIT.2017.00020","DOIUrl":"https://doi.org/10.1109/FIT.2017.00020","url":null,"abstract":"This paper presents a novel approach to automate the process of extracting topic and main title from a single-document short text. The proposed approach uses online text mining and Natural Language Processing techniques. The title of any text provides an efficient way to concisely grasp the overview of the contents in the text by giving a glance on its main heading only, which is quicker than reading the summary. In this paper, three different mechanisms have been proposed, implemented and compared to find the best approach for automatic extraction of a topic that is more relevant to the overall event explained in the text. The proposed system is evaluated against fifteen news articles from New York Times. The significance of the paper is twofold: Firstly, these automatic topic extraction techniques can be used further for document classification, document relevancy and similarity, summarization, comprehensive grasp of any event and finding novelty in out sized and scattered text data by scanning titles. Secondly, it can be used as a road map for the new researchers by using this detailed analysis of various data mining techniques. The experimental results show that the Nouns are more related, reliable, and suitable words for finding the topic of the text.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134591867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}